In view of technology backward of the friend or foe identification and having not a subtle and effective internal communication mechanism in the current security system on duty, which leads to a serious security threa...
详细信息
ISBN:
(纸本)9781509039456;9781509039449
In view of technology backward of the friend or foe identification and having not a subtle and effective internal communication mechanism in the current security system on duty, which leads to a serious security threat on personnel life and the major task to be defeated. This paper presents an IFF identity authentication scheme of security and guarantee system based on ellipticcurve encryption;it is effective to solve these problems, such as internal confidential files to be stolen,vital data to be destroyed and legal camouflage of identity by hacking into the police service systems. The scheme is suitable for the identification of the light weight mobile terminal in infinite network environment, which has the characteristics of high security, high efficiency and bandwidth saving.
In the smart grid and big data environment, accurate and large amount of power load data for users can be obtained with the wide application of non-intrusive load monitoring technology. In the research process of cust...
详细信息
In the smart grid and big data environment, accurate and large amount of power load data for users can be obtained with the wide application of non-intrusive load monitoring technology. In the research process of customers' information, information security protection of users' electricity data has become a research hotspot urgently. This article proposes a new type of load decomposition method for electric vehicle load information and compares it with hidden Markov model algorithm to verify its accuracy. On this basis, the ellipticcurve encryption algorithm is used to encrypt the users' electricity data, and the function and effectiveness of the encryption algorithm are verified by comparing the load decomposition of the electric vehicle with the unencrypted data.
In this article, a new method to optimize the supply chain system (SCS) of logistics companies in the era of Internet of Things (IoT) using an improved ellipticcurvecryptography (ECC) algorithm was put *** focus of ...
详细信息
In this article, a new method to optimize the supply chain system (SCS) of logistics companies in the era of Internet of Things (IoT) using an improved ellipticcurvecryptography (ECC) algorithm was put *** focus of this research was to address the challenges faced by logistics organizations in adapting to the complexity of modern supply chains and meeting the growing demands of customers. The research aimed to improve the efficiency, security and reliability of supply chain management systems by utilizing advances in ECC *** conducting comprehensive performance tests of the proposed system, including interface testing, joggle testing, and system response time analysis, the study demonstrated the superiority of the system over traditional systems. The research findings indicated that the system based on the improved ECC algorithm outperformed traditional systems in terms of interface effectiveness, usability, and system response time. The improved ECC algorithm enhanced the security of the encryption process, making it more resistant to unauthorized access, and improved the system's overall data processing load capacity. Additionally, the system demonstrated superior performance in managing logistics data and information, facilitating better decision-making and efficiency in logistics operations. Overall, this research contributes to the advancement of supply chain management in the IoT era by providing a practical and efficient solution for logistics enterprises to optimize their supply chain systems. The innovative application of the improved ECC algorithm offers a secure, reliable, and efficient approach to managing logistics operations, addressing the challenges posed by the complexities of modern supply chains.
A cyberattack is a serious crime that could affect medical organizations. These attacks could affect medical organization sensitive data disclosure, loss of organization data, or the business's continuity. The Man...
详细信息
A cyberattack is a serious crime that could affect medical organizations. These attacks could affect medical organization sensitive data disclosure, loss of organization data, or the business's continuity. The Man-in-The-Middle (MITM) attack is one of the threats that could impact medical organizations. It happens when unapproved outsiders break into the traffic between two parties that think they are conversing directly. At the same time, the adversary can access, read, and change secret information. Because of that, medical organizations lose confidentiality, integrity, and availability. Data encryption is a solution that changes vital information to unreadable by unauthorized and unintended parties. It could involve protecting data with cryptography, usually by leveraging a scrambled code. Only the individuals with the decoding key can read the information. There is no full protection due to the variety of MITM attacks. Each encryption algorithm has its advantages and disadvantages, like the speed of encryption and decryption, strength of the algorithm, and the cipher type. This research investigates the MITM attacks and comprehensively compares the Rivest Shamir Adleman algorithm and the elliptic curve cryptography algorithm.
暂无评论